Results 141 to 150 of about 24,382 (331)

Trabecular bone ontogeny of the human talus

open access: yesThe Anatomical Record, EarlyView.
Abstract Studies of trabecular ontogeny may provide insight into the factors that drive healthy bone development. There is a growing understanding of how the juvenile skeleton responds to these influences; however, gaps in our knowledge remain. This study aims to identify ontogenetic trabecular patterns and regional changes during development within ...
Rebecca A. G. Reid   +2 more
wiley   +1 more source

Dynamics Data Encryption Based on Chaotic Functions and Elliptic Curves: Application to Text Data

open access: yesAl-Mustansiriyah Journal of Science
Background: Given the vast amount of data generated daily on the Internet, numerous cryptosystems have been developed to ensure data confidentiality using symmetric, asymmetric, or hybrid encryption techniques. However, many of these systems suffer from
Joel Kinganga   +2 more
doaj   +1 more source

Session Initiation Protocol Attacks and Challenges

open access: yes, 2012
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP).
Keshavarz, Hassan   +2 more
core  

A detailed redescription of a skeletally immature ‘Redondasaurus’ suggests ontogenetic transformations in the taxon mirror phytosaurian morphological evolution

open access: yesThe Anatomical Record, EarlyView.
Abstract The study of morphological evolution is fundamentally tied to ontogeny, yet studies of these heterochronic processes in the fossil record are rare. Fossils belonging to an ontogenetic series are difficult to assign to an ontogenetic stage due to inconsistent proxies for skeletal ages, challenging to taxonomically assign due to morphological ...
Erika R. Goldsmith, Michelle R. Stocker
wiley   +1 more source

BPAP: FPGA Design of a RISC-like Processor for Elliptic Curve Cryptography Using Task-Level Parallel Programming in High-Level Synthesis

open access: yesCryptography
Popular technologies such as blockchain and zero-knowledge proof, which have already entered the enterprise space, heavily use cryptography as the core of their protocol stack.
Rares Ifrim, Decebal Popescu
doaj   +1 more source

A novel authentication scheme for anonymity and digital rights management based on elliptic curve cryptography

open access: bronze, 2018
Cheng‐Chi Lee   +4 more
openalex   +1 more source

PMNS Arithmetic for Elliptic Curve Cryptography

open access: yes
We show that using the polynomial modular number system (PMNS) can be relevant for real-world cryptographic applications even in terms of performance. More specifically, we consider elliptic curves for cryptography when pseudo-Mersenne primes cannot be used to define the base field (e.g.
Fangan Yssouf Dosso   +3 more
openaire   +1 more source

3D anatomical atlas of the heads of male and female adult Chamaeleo calyptratus

open access: yesThe Anatomical Record, EarlyView.
The veiled chameleon is a model organism in reptile development research. Utilizing contrast‐enhanced microCT and deep learning segmentation models, we have generated the first digital atlases of the skull, nervous system, cranial muscles and hyolingual muscles.
Alice Leavey   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy